This is an interactive implementation of the Massey-Omura cryptosystem. For a brief introduction, see the next slide.
It is sometimes the case in mathematics that operations are easier to perform than to undo (there is a reason you learn how to compute powers before logarithms!).
One such example is calculating multiples of points on elliptic curves according to the group law - more directly, given a point $P$, it is significantly easier
to compute multiples $kP$ than it is to figure out $k$ such that $kP$ is equal to a given point $Q$ (this is known as the 'elliptic curve discrete logarithm problem').
The goal of a cryptosystem is to exploit the 'one-way' nature of operations like the elliptic curve group law to allow secure communication that can be quickly encrypted
and decrypted by the sender and recipient, but is incredibly resilient to third parties.
ECC (elliptic curve cryptography) is incredibly common - in fact, your browser and computer are probably using it right now. The most common use case
is for TLS (transport layer security), the protocol that secures most of your important web traffic. Therefore, your ability to access your bank account online securely rests on
cryptography like ECC and the math that powers it.